HB-MP: a further step in the HB-family of lightweight authentication protocols
From MaRDI portal
Publication:883245
DOI10.1016/J.COMNET.2007.01.011zbMATH Open1118.68015OpenAlexW2076545682MaRDI QIDQ883245FDOQ883245
Publication date: 4 June 2007
Published in: Computer Networks (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.comnet.2007.01.011
Recommendations
Data encryption (aspects in computer science) (68P25) Network design and communication in computer systems (68M10) Authentication, digital signatures and secret sharing (94A62)
Cited In (11)
- Two-Round Man-in-the-Middle Security from LPN
- How to Encrypt with the LPN Problem
- : Increasing the Security and Efficiency of
- Good Variants of HB + Are Hard to Find
- On the Security of HB# against a Man-in-the-Middle Attack
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols
- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
- HB-MP
- A protocol for provably secure authentication of a tiny entity to a high performance computing one
- Efficient authentication from hard learning problems
- Trusted-HB: A Low-Cost Version of HB$^+$ Secure Against Man-in-the-Middle Attacks
This page was built for publication: HB-MP: a further step in the HB-family of lightweight authentication protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q883245)